You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@blag you misunderstand, I'm not talking about CVE-2020-25658 (which only got a workaround, not a proper fix)
This is about the fact that pyca/cryptography needs a new API that implements the whole "generate a random value, test padding, return the random value instead of the decrypted value when padding check failed" to handle PKCS#1 v1.5 securely as it's impossible to do it securely on Python level.
As far as I can tell,
python-jose
supports PKCS#1 v1.5 for key transport:https://github.com/mpdavis/python-jose/blob/99ec142374a6eb98e32be5b8cdfd72508fd404d4/docs/jwe/index.rst#supported-key-management-algorithms
and:
python-jose/tests/test_jwe.py
Lines 84 to 97 in 99ec142
at the same time, pyca/cryptography doesn't guarantee side-channel safety of their decryption API:
pyca/cryptography#5510
pyca/cryptography#5600
pyca/cryptography@1ac4759
which means that python-jose with PKCS#1 v1.5 is insecure
The text was updated successfully, but these errors were encountered: